On Jan 7, 2020, at 8:53 AM, Owen Friel (ofriel) <ofr...@cisco.com> wrote: > [ofriel] That’s pretty much it. For supplicants running on standard OSes > (Windows, MacOS, iOS, Android), they could use logic similar to Chromium > (which you must be familiar with seeing as you helped write it: > https://github.com/chromium/chromium/commit/36f20e46515ab61df4ae4af9655b647bf9a0ea5a#diff-fa455b6e65ab2ae19d64635ada88077e > ) to ask the OS if a presented EAP cert is one issued by a public CA. This > does mean that the supplicant is asking about Web TLS certs that Browsers > trust. However, there are ample examples and support cases opened by > operators who are trying to do exactly that – get a web PKI cert from a > public TLS/Browser CA and deploy it on an EAP server. Is this recommended? > Not really. Is it using a Web/TLS cert for a purpose its not strictly > intended for? Yes. Does this happen in real deployments? Absolutely. How > prevalent is it? I do not have that data.
So far as I know, every EAP supplicant checks for the id-kp-serverAuth OID. So yes, *all* EAP supplicants check that the certificate presented by the EAP server is valid for TLS web servers. That seems wrong. But it's what people do. > [ofriel] I agree that ideally Web/TLS Browser certs should not really be > used by operators as their EAP server identity certs, however, this does > actually happen today. In an ideal world, it would be great if some of the > large commercial (or free e.g. LetsEncrypt) public Web/TLS CAs had an > intermediate signing CA with id-kp-eapOverLAN. But today, and for the > foreseeable future, what can we advise supplicants to do if we know that some > operators will put Web/TLS identity certs from public CAs on their EAP > servers? Not "some", but "all". > [ofriel] Getting public CAs to manage a new PKI root (if that’s easier than > just a new intermediate) with id-kp-eapOverLAN is a really really long road. > And we know that some operators do use public Web/TLS certs as EAP identity > certs. Which means that we cannot recommend supplicants enforce a check for > id-kp-eapOverLAN. > > So it looks like there are three choices: > 1. Completely ignore id-kp-eapOverLAN for ever. > 2. Get supplicants to check id-kp-eapOverLAN if its not a public CA (and > use Chromium style public CA detection). Rollout of this would need to be > carefully managed too so that existing private CA operators who do not set > id-kp-eapOverLAN do not break. > 3. Do nothing until sufficient numbers of public CAs support > id-kp-eapOverLAN (in like 2035..?), then change supplicants to always check > for id-kp-eapOverLAN. I think there should be continued discussion about what is the end goal, and how we can get there. Once those issues are defined, then it's simpler to fix the supplicants. > Its not clear to me where the correct forum is to even document these > recommendations, or who needs to be involved. The Wi-Fi alliance is already moving ahead with a similar approach. https://www.wi-fi.org/download.php?file=/sites/default/files/private/WPA3_Specification_v2.0.pdf See Section 5, page 10. A shorter description is here: http://lists.freeradius.org/pipermail/freeradius-users/2019-December/097080.html Alan DeKok. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu